You are on page 1of 26

Introduction to the

Architectural Reference Model


for the
Internet of Things

Executive Summary
Executive Summary
This Introduction to the Archi- and its goals. Furthermore, this introduction
tectural Reference Model (ARM) shall serve as guidance for reading the actual
for the Internet of Things which documents issued by the IoT-A project as deliv-
is currently developed by the erables. All documents and deliverables re-
project partners of the European FP7 Research ferred to in the subsequent pages are publicly
Project IoT-A shall give the reader a first available and can be downloaded at
glimpse into the concepts of the ARM, its origin http://www.iot-a.eu/arm.

Executive Summary  
Today, "Internet of Things" (IoT) is used as a catch- to a faster, more focused development and an ex-
phrase by many sources. This expression encom- ponential increase of IoT-related solutions. These
passes a galaxy of solutions somehow related to solutions can provide a strategic advantage to ma-
the world of intercommunicating and smart objects. ture economies, as new business models can lev-
These solutions show little or no interoperability erage those technological solutions providing room
capabilities as usually they are developed for spe- for economic development.
cific challenges in mind, following specific require-
Leaving aside business considerations, and consid-
ments. Moreover, as the IoT umbrella covers totally
ering only the technical point of view, the existing
different application fields, development cycles and
solutions do not address the scalability require-
technologies used vary enormously, thus imple-
ments of a future IoT, both in terms of communica-
menting vertical solutions that can be labelled as
tion between and the manageability of devices.
"INTRAnet of Things", rather than "INTERnet of
Additionally, as the IoT domain comprises several
Things". For instance, in some fields such as manu-
different governance models, which are often in-
facturing and logistics, communication and tagging
compatible. This leads to a situation where privacy
solutions are well established as they provide a
and security are treated on a per-case and per-
clear business benefit in terms of asset tracking and
legislation basis, retro-fitting solutions to existing
supply-chain management. However, the same
designs, and this severely hampers portability, in-
solutions do not apply for other fields such as do-
teroperability and deployment.
motics, where business synergies could provide
services with clear added-value benefits. In our vision of the Internet of Things, the interoper-
ability of solutions at the communication level, as
While quite logical at this point, on the long run we
well as at the service level, has to be ensured
believe that this situation is unsustainable. As in the
across various platforms.
networking field, where several solutions emerged
at his infancy to leave place to a common model, This motivates, first, the creation of a Reference
the TCP/IP protocol suite, the emergence of a Model for the IoT domain in order to promote a
common reference model for the IoT domain and common understanding.
the identification of reference architectures can lead

Executive Summary
Second, businesses that want to create their own common traits are derived to form the base line of
compliant IoT solutions should be supported by a the Architectural Reference Model (ARM). This
Reference Architecture that describes essential has the major advantage of ensuring backward-
building blocks as well as design choices to deal compatibility of the model and also the adoption of
with conflicting requirements regarding functionality, established, working solutions to various aspects of
performance, deployment and security. Interfaces the IoT. With the help of end users, organised into a
should be standardised, best practices in terms of stakeholders group, new requirements for IoT have
functionality and information usage need to be pro- been collected and introduced in the main model
vided. building process. This work was conducted accord-
ing to established architecture methodology.
The central choice of the IoT-A project was to base
its work on the current state of the art, rather than
using a clean-slate approach. Due to this choice,

Objectives and Outline of the current version of the ARM 
The previous version v0.9 of the ARM was pub- comes with the Deployment & Operation and In-
lished approximately one year ago as project deliv- formation views and with the Evolution & In-
erable D1.2, and presented to a large audience teroperability, Performance & Scalability and
during the IoT week 2011 in Barcelona. As a result Availability & Resilience perspectives. It will be
we received a large number of comments, the ma- shown in the document how the Design Choic-
jority of them being taken into account already in es applied at the view levels impact the various
the new version v1.5 of the ARM. quality properties attached to the system archi-
tecture materialised by the four perspectives in-
While the general objective of v1.5 is the same as it
troduced above;
was for v0.9, i.e., describing thoroughly an Architec-
tural Reference Model for IoT, this version of the  First version of Best Practices and associated
ARM brings to the audience substantial improve- Design Choices which are an initial step to-
ments over the previous version, as summarised wards an aided architecture design for concrete
below: system architects;

 All feedback received internally from IoT-A and  Improvement of the soundness of the whole
externally from the stakeholders was taken into ARM approach, emphasizing the logical links
account in order to improve the document and existing between the various elements and sub-
in order to make sure that the IoT-A architecture models of the Reference Model and the views
work will eventually meet expectations from the and perspectives of the Reference Architecture.
external users;
Document structure  
 Introduction of new views and perspectives This document just gives an introduction to the
beyond the Functional Decomposition view and ARM. It first explains the vision and rationale behind
Security Perspective touched in v0.9. V1.5 it, as well as the benefits of using the ARM. There-

Objectives and Outline of the current version of the ARM


after the process and the methodology used to de- ARM is beneficial, thus also validating the useful-
velop the ARM, as well as how the ARM should be ness of creating an Architectural Reference Model
applied when developing concrete systems, is de- for the Internet of Things.
scribed.
The full ARM is downloadable from
The final section then highlights some of the main http://www.iot-a.eu/arm.
business scenarios where the application of the

Introduction to the ARM – Vision 
Many popular “umbrella” topics like Smart Cities pull reached at the communication level as well as at
a large number of specific application domains like the service and the information level, going across
Transportation, Energy, Environment, Assisted Liv- different platforms, but established on a common
ing, most of the time pre-fixed with “Smart” some- grounding. The IoT-A project reckons that achieving
times for obvious marketing reasons but also -more those goals comes in two steps, first of all in estab-
generally- in order to emphasise the fact they em- lishing a common understanding of the IoT domain
bed a certain degree of intelligence and global (hereafter called Reference Model), and second in
awareness. This new breed of applications exploits providing to IoT system developers a common
IoT related technologies, however, the resulting foundation for building interoperable IoT system
applications unfortunately appear as vertical silos architectures (hereafter called Reference Architec-
only, meaning specific applications with specific ture).
architectures, with little place left for inter-system
A Reference Architecture (RA) can be visualised as
communication and inter-operation. Actually that is
the “Matrix” that eventually gives birth ideally to all
where the real issue lies: the smartness of those
concrete architectures. For establishing such a Ma-
new applications can only reach its pinnacle if full
trix, based on a strong and exhaustive analysis of
collaboration between those vertical silos can be
the State of the Art, we need to envisage the super-
achieved.
set of all possible functionalities, mechanisms and
If we consider also the fact that IoT related technol- protocols that can be used for building such con-
ogies come with a high level of heterogeneity, with crete architecture and to show how interconnections
specific protocols developed with specific applica- could take place between selected ones (as no
tions in mind, it is no surprise that the IoT landscape concrete system is likely to use all of the functional
nowadays appears as highly fragmented. Many IoT- possibilities). Giving such a foundation along with a
enabled solutions exist with recognised benefits in set of design-choices, based on the characterisation
terms of business and social impact, however they of the targeted system w.r.t. various dimensions
form what we could call a set of Intranets of Things, (like distribution, security, real-time, semantics,…) it
not an Internet of Things! becomes possible for a system architect to select
the protocols, functional components, architectural
In the vision of the Internet of Things IoT-A wants to
options, … needed to build their IoT systems.
promote, a high level of interoperability needs to be

Introduction to the ARM – Vision


The main aim of IoT-A can be explained using the here, as it represent the Architectural Reference
pictorial representation shown below. Model (ARM). The ARM is the combination of the
Reference Model and the Reference Architecture,
As any metaphoric representation, this tree does
the set of models, guidelines, best practices, views
not claim to be fully consistent in its depiction; it
and perspectives that can be used for building fully
should therefore not be interpreted too strictly. On
interoperable concrete IoT architectures and sys-
the one hand, the roots of this tree are spanning
tems. In this tree, we aim at selecting a minimal set
across a selected set of communication protocols
of interoperable technologies (the roots) and pro-
(6LoWPAN, Zigbee, IPv6,…) and device technolo-
posing the potentially necessary set of enablers or
gies (sensors, actuators, tags,..) while on the other
building blocks (the trunk) that enable the creation
hand the blossoms / leaves of the tree represent the
of a maximal set of interoperable IoT systems (the
whole set of IoT applications that can be built from
leaves).
the sap (i.e., data and information) coming from the
roots. The trunk of the tree is of utmost importance The ultimate aim of the Reference Architecture

Figure 1: The IOT-A Tree

Introduction to the ARM – Vision


work is to make sure that concrete system design- explicit the various links existing between the vari-
ers will eventually use it. High attention is therefore ous models, views and perspectives, so that it will
paid to ensuring the soundness of our work. In par- make the work of systems designers easier.
ticular this version of the ARM aims at making more

The ARM Rationale
Figure 2 shows an overview of the process we used ling, and the business scenarios and stake-
for defining the different parts that make the IoT-A holders addressed.
ARM. Notice that definitions of terms such as refer-
- Business scenarios defined as require-
ence architecture, etc. can be found in an external
ments by stakeholders are the drivers of
glossary (see www.iot-a.eu/public/terminology).
the architecture work. With the knowledge
Starting with existing architectures and solutions,
of businesses aspirations, a holistic view of
generic baseline requirements can be extracted and
IoT architectures can be derived. Further-
used as an input to the design. The IoT-A ARM
more, a concrete instance of the reference
consists of four parts:
architecture can be validated against se-
- The vision summarises the rationale for lected business scenarios. A stakeholder
providing an architectural reference model analysis contributes to understanding which
for the IoT. At the same time it discusses aspects of the architectural reference model
underlying assumptions, such as motiva- need to be described for the different
tions. It also discusses how the architectur- stakeholders and their concerns. According
al reference model can be used, the meth- to common usage, this part constitutes a
odology applied to the architecture model- subset of the vision.

Figure 2: IoT-A architectural reference model building blocks.


- The IoT Reference Model provides the standards The creation of the IoT Refer-
highest abstraction level for the definition of ence Architecture focuses on abstract sets
the IoT-A Architectural Reference Model. It of mechanisms rather than concrete appli-
promotes a common understanding of the cation architectures.
IoT domain. The description of the IoT Ref-
To organisations, an important aspect is the com-
erence Model includes a general discourse
pliance of their technologies with standards and
on the IoT domain, an IoT Domain Model
best practices, so that interoperability across organ-
as a top-level description, an IoT Infor-
isations is ensured. If such compliance is given, an
mation Model explaining how IoT infor-
ecosystem forms, in which every stakeholder can
mation is going to be modelled, and an IoT
create new businesses that “interoperate” with al-
Communication Model in order to under-
ready existing businesses. The IoT-A ARM provides
stand specifics about communication be-
best practices to the organisations so that they can
tween many heterogeneous IoT devices
create compliant IoT architectures in different appli-
and the Internet as a whole. The definition
cation domains. Those IoT architectures are in-
of the IoT Reference Model is conforming to
stances from the Reference Architectures with
the OASIS reference model definition.
some architectural choices (called later on Design
- The IoT Reference Architecture is the ref- Choices) like considering strong real-time or choos-
erence for building compliant IoT architec- ing strong security features, etc. They form thus
tures. As such, it provides views and per- special “flavours” of the IoT Reference Architecture.
spectives on different architectural aspects Where application domains are overlapping, the
that are of concern to stakeholders of the compliance to the IoT Reference Architecture en-
IoT. The terms view and perspectives are sures the interoperability of solutions and allows the
used according to the general literature and formation of new synergies across those domains.

Benefits of using the ARM
Using the IoT-A ARM can provide many benefits. Second, the high-level view provided in such a
We list here the most important ones. model is of high educational value, since it provides
an abstract but also rich view of the domain. Such a
Cognitive aid 
view can help people new to the field with under-
When it comes to product development and other
standing the particularities and intricacies of IoT.
activities, an architectural reference model is of
fourfold use. Third, the architectural reference model can assist
IoT project leaders in planning the work at hand and
First, it aids in guiding discussions, since it provides
the teams needed. For instance, the Functionality
a language everyone involved can use, and which
Groups identified in the functional view of the IoT
is intimately linked to the architecture, the system,
system can also be understood as a list of inde-
the usage domain, etc.
pendent teams working on an IoT system imple-
mentation.

Benefits of using the ARM


Fourth, the architectural reference model aids in Identifying differences 
identifying independent building blocks for IoT sys- When using the aforementioned system-generation
tems. This constitutes very valuable information tools, which are based on the IoT-A ARM, any dif-
when dealing with questions like system modularity, ferences in the derived architectures can be at-
processor architectures, third-vendor options, re- tributed to the particularities of the pertinent use
use of already developed components, etc. case. When applying the IoT-A ARM, predictions of
system complexity, etc. are available for the system
IOT‐A Reference Model as a common ground 
parts to be implemented. That makes judging the
Establishing a common ground for a field is not an
overall implementation effort for use case imple-
easy task. To be effective, such a ground has to
mentation easier, and some projects that might not
capture as many pertinent vantage points as possi-
have been realised due to uncertainties in the pro-
ble. Establishing the common ground encompasses
ject plan might become possible. The overall im-
the definition of IoT entities and describing their
plementation effort is most certainly less than de-
basic interactions and relationships with each other.
veloping an architecture without the help of an ar-
The Architecture Reference Model is providing ex-
chitectural reference model.
actly such a common grounding for the IoT field.
Any party envisaging to develop an IoT system that Benchmarking 
is IoT-A compatible must build on the common con- Another important use is benchmarking. For exam-
cepts provided in the IoT-A Reference Model. ple, NASA used a reference architecture of its new
exploration vehicle for better benchmarking tenders
Generation of architectures 
it was going to receive during a public bidding pro-
Another benefit is the use of the IoT-A ARM for the
cess. While the reference model prescribes the
generation of compliant architectures for specific
language to be used in the systems/architectures to
systems. This could be done by enabling tool sup-
be assessed, the reference architecture states the
port. The benefit of such a generation scheme for
minimum (functional) requirement on the sys-
IoT architectures is not only the automatism of this
tems/architectures. By standardising the description
process, and thus the saved R&D efforts, but that
and also the ordering and delineation of system
the generated architecture will provide intrinsic in-
components and aspects, it also provides a high
teroperability of the derived IoT systems.
level of transparency and inherent comparability to
the benchmarking process.

Process and Architecture Methodology
This Section provides a meta-perspective of IoT-A reference model, before we discuss how the parts
process, viz. a look at how the IoT ARM model was of the IoT ARM have been developed.
derived. It also explains the basic process how con-
crete systems can be developed by using the ARM Introduction 
Through the development of an architecture, a solu-
First, we need to understand why the reference
tion to a pre-defined goal is found. The develop-
architecture derived needs to be accompanied by a
ment and description of architectures in turn is a
modelling exercise. In this respect it is important to tures. With this knowledge at hand we dive into the
point out that the modelling itself does not happen details of the development process. First, we re-
in a vacuum, but rests on a thorough understanding state the goals of IoT-A and how we translated
of the domain modelled. In other words, any archi- them into a step-by-step process. Second, we ex-
tecture development is contingent on one’s under- plain how concrete architectures can be generated
standing of the domain in question. The same is from the ARM. Next, we discuss the methodologies
true for a generalisation of this process, viz. the available for conducting each step. As it turns out,
derivation of reference architectures. Thus, refer- there is no standardised methodology for the deri-
ence architectures also have to be based on a de- vation of ARMs. In order to overcome this lack of
tailed understanding of the domain in question. This ARM methodology, we assessed the well-equipped
understanding is commonly provided in the form of toolboxes for the development of use-case- and
a reference model. application-specific architectures instead. Since
these methods intrinsically rely on the specificity of
The above discourse motivates why the IoT Refer-
the pertinent use cases and application scenarios, it
ence Architecture is accompanied by a thorough
is found that the methods considered, for instance
discussion of the IoT domain in the form of an IoT
model-driven engineering cannot always be applied
Reference Model. However, this high-level view
one to one. This Section concludes with a detailed
does not explain how one derives either. What is
discussion of our requirements process, which is at
needed here are both a process and a methodology
the heart of our entire architecture process.
for deriving the parts of the ARM. The process de-
scribes what steps need to be undertaken during Reference model and reference architec‐
the derivation of the architectural reference model, ture 
and the methodology describes how these steps Reference models and reference architectures pro-
are achieved. In other words, the methodology de- vide a description of greater abstraction than what
scribes how to identify the tasks attached to each is inherent to actual systems and applications. They
development step, and how and in which order to are more abstract than system architectures that
conduct these steps. Both the process and the have been designed for a particular application with
methodology description are provided in this Sec- particular constraints and choices. From the litera-
tion. ture, we can extrapolate the dependencies of refer-
ence architecture, architectures, and actual systems
The remainder of the text in this Section is organ-
(see Figure 3).
ised as follows. To start with, we provide a short
discussion of the particularities of reference archi- Architectures do help in designing, engineering,
tectures and how they relate to concrete architec- building, and testing actual systems. At the same
tures, and also how they relate to reference models. time, understanding system constraints better can
This information enables us to discuss what high- provide input to the architecture design, and in turn
level actions and input is needed for the derivation this allows identifying future opportunities. The
of an ARM, and what input is needed in order to structure of the architecture can be made explicit
guide the transformation of the reference architec- through an architecture description, or it is implicit
ture into use-case- and application-specific architec- through the system itself.

Process and Architecture Methodology


By extracting essentials of existing architectures, taxonomy already provides us with a high-level
like mechanisms or usage of standards, a reference perspective of actions and inputs needed for devel-
architecture can be defined. Guidance in form of oping an ARM for IoT.
best practices can be associated to a reference
architecture in order to derive use-case-specific

Best Practice
architectures from the reference architecture (see
Figure 4). Such guidance can, for instance, make
new architectures and systems compliant to each
Figure 4: Relation of an architectural reference
other. These general architecture dependencies model, best practice, and concrete architectures.
apply to the modelling of the IoT domain as well.
A high-level taxonomy of how we understand the
While the model presented in Figure 3 stops at the reference-architecture process is depicted in Figure
reference architecture, the IoT-A architectural refer- 5. As discussed earlier, the IoT Reference Model
ence model goes one step beyond and also defines provides guidance for the description of the IoT
a reference model. As already discussed earlier, a Reference Architecture. The Best Practice guides
reference model provides the grounding for a com- the derivation of IoT-A-compliant domain-specific
mon understanding of the IoT domain by modelling architectures from the reference architecture.
its concepts and their relationships.
Essential inputs for the definition of the IoT refer-
Actions and inputs  ence model are stakeholder concerns, business
In the previous Section we discussed how reference scenarios, and existing architectures. It is important
architectures relate to architectures and real sys- to create a common understanding of the IoT do-
tems. In order to derive such a reference architec- main from the different inputs. This is mainly a
ture and the reference model upon which the refer- modelling exercise, during which experts have to
ence architecture builds, one needs better how they work together and extract the main concepts and
relate to each other and to external input. Such a their relations of the IoT domain from available

Figure 3: Relationship between a reference architecture, architectures, and actual systems (adapted
from literature).

Process and Architecture Methodology


knowledge. vidual tasks within the development process, that
provides insight in the dependencies of said tasks,
Furthermore, business scenarios, existing architec-
and that provides a dynamic model of the develop-
tures, and stakeholder concerns can be trans-
ment process itself (viz. what step follows after the
formed into application-specific requirements. When
next).
extrapolated, these requirements lead to a set of
unified requirements. Unified requirements in turn Overall process 
steer the definition of the IoT Reference Architec-
ARM development 
ture.
A process-based view of the ARM derivation is
Within the ARM, the IoT Reference Model guides shown in Figure 6. The ARM development process
the definition of the IoT Reference Architecture, consists of one main process, which is the ARM
creating dependencies between the Reference derivation. Within the ARM derivation two actions
Architecture and the Reference Model; once a are worth mentioning, viz. the domain modelling,
change is proposed in the Reference Model a clear which results in the IoT Reference Model, and the
chain of dependencies can be followed and lead to functional modelling, which is the main contributor
subsequent changes within the Reference Architec- to the IoT Reference Architecture. This process
ture. By so doing, an overall consistency of the IoT- receives input from the requirement-collection pro-
A ARM is maintained. cess, which in turn receives input from external
stakeholders and the state-of-the-art surveys con-
As one can see, this high-level representation al-
ducted during the early stages of IoT-A.
ready identifies high-level actions for the derivation
of the ARM and for domain-specific architectures The work in the ARM-derivation process is present-
(“understand”, “define”, etc.). However this view is ed as an ARM draft. The initial ARM draft v0.9 was
still too abstract for being of use in the day-to-day presented in deliverable D1.2.
development work of the project. What is needed is
The ARM draft guides the setup- up of the public
a detailed architecture process that identifies indi-

Figure 5: High-level representation of the IoT-Reference-Model and IoT-


Reference-Architecture dependencies and model influences.

Process and Architecture Methodology


use-case demonstrations as well as the work of the gaps and inconsistencies are revealed. Also, the
technical work packages within IoT-A (“technical best-practice exercise deepens our understanding
analysis”). of the IoT domain, and provides additional guidance
on what aspects of the ARM need further en-
The ARM draft is reviewed by the project’s external
hancement. Last but not least, studying the transla-
stakeholders, the demonstration activity, as well as
tion of ARM into specific architectures and vice
the technical work packages. This review serves as
versa provides a compelling validation of the use-
input for a revision of the ARM. In other words, the
fulness of the ARM.
IoT-A project follows the well-established spiral
design and prototyping model. The result from the The spiral-model approach inherent in the ARM
first iteration of this development cycle is the current development process was chosen for the following
document, viz. ARM version v1.5. Before the con- reasons. Firstly, each new iteration of the process
clusion of the project two more iterations are increases the stability of the ARM. Secondly, due to
planned, resulting in v1.6 and v1.7, respectively. its multi-step nature, the dissemination of the (em-
bryonic) ARM starts early within the project. Thanks
Besides the architecture and domain analysis we
to early publication corrective impulses from peers
also provide the user of the ARM with best practices
and external stakeholders are received timely in the
for deriving use-case- and application-specific archi-
development process and can thus positively influ-
tectures (see Figure 6). Besides being of benefit for
ence both the applicability of the ARM as well as its
the user of the ARM, this process has the side ben-
acceptance. Third, this approach formalises and
efit of providing valuable feedback to the ARM deri-
coordinates the interaction of the architecture activi-
vation itself. When devising guidelines for translat-
ty within IoT-A with that of the other activities (tech-
ing the ARM into a specific architecture, potential

<<guides>>
Technical analysis

«input»
«input»
«guides»
Demonstrator
implementation

ARM development

ARM rev iew


«input»
«resource» «input» Stakeholders
ARM draft
«input»
«input»
«input»
Best practice

«output» Requirement collection

«input»
ARM deriv ation
«input» «input»
Domain modelling

«information»
State of the art

Functional modelling

Figure 6: Dynamic view of the IoT-A ARM process.

Process and Architecture Methodology


nical analysis and demonstrator set up), which is model as well as how to derive the best practices.
expected to enhance the efficacy of this exchange. Simply dissecting them into design steps and pro-
cesses is not enough; one needs to know how to
Generation of architectures 
achieve each step.
So far we have only described the genesis of the
IoT-A ARM, but not how its use for the generation of In the case of the ARM there are, to our knowledge,
specific architectures actually works. While Figure 4 no standardised approaches for developing such a
explains that the Best Practice accomplishes the model. Furthermore, the IoT usage domain is, com-
transformation from the IoT ARM to a concrete ar- pared to typical reference-architecture domains,
chitecture, the detailed picture is actually more extremely wide and varied, and common denomina-
complex. tors are thus rather few and abstract. This high level
of abstraction in terms of the domain to be modelled
When applying the ARM in the design of systems, it
stands in contrast to input needed for established
is likely that different architectures will result subject
and standardised methodologies such as, for in-
to the desired properties of the system. So, the
stance, Aspect-Oriented Programming, Model-
best-practice transformation depicted in Figure 4
Driven Engineering, Pattern-Based Design, and
relies on a use-case description and requirements.
SysML. All these methodologies were designed for
This fact is reflected in Figure 8. The role of the
very concrete use cases and application scenarios.
ARM is to guide the architect through design choic-
Unfortunately, this high degree of specificity is even
es at hand, and to provide best practices and de-
defining their inner workings. In other words, if one
sign patterns for those different choices. The ARM
applies them to generalised use cases, one does
is not operating in a design vacuum but should be
often not get generalised models on the abstract
applied together with proven design-process prac-
level of an ARM as desired, since the processes of
tices.
which said methodologies are constituted do not
When designing concrete systems, one needs to work for generalised use cases.

keep in mind that in practice this will not always be


We illustrate the above issue with two examples,
the case. Depending on the engineering strategies
Model-Driven Engineering (MDE) and Pattern-
used, some of the steps can be done in parallel or
Based Design (PBD). In the first case, the method-
even have to be reiterated due to additional under-
ology is not directly applicable, while, in the second
standing gained during the process, or due to
case, the methodology can potentially be general-
changes in the requirements.
ised for deriving the best-practice transformation in

Choice of design and development methodology  Figure 9.

The choice of a design and development methodol- Model-Driven Engineering for the generation of
ogy can be understood in two ways: first, a method- Model-Driven Architectures is standardised by the
ology for the ARM development and second, a Object Management Group. Its application area is
methodology for generating specific architectures. the development of software systems. It provides an
We have so far only provided high-level views of approach for, first, specifying a system inde-
either case. In reality one needs more guidance, pendently from the platform; second, specifying
viz. a recipe on how to derive all aspect of the ARM platforms; third, choosing a particular platform for

Process and Architecture Methodology


«resource»
IoT Architectural
Reference Model

«guides via Best


Practice»

«information»
Use Cases & «resource»
Requirements System Design Concrete
«input» «output» Architecture

«guides»

«resource»
Engineering Strategies

Figure 8: Process for the generation of concrete architectures.

the system; and fourth, transforming the system phone model featuring a particular operation sys-
specification into that of a particular platform. The tem.
goals behind this approach are portability, interop-
While this sounds very much like the Best-Practice
erability, and reusability through the architectural
transformation depicted in Figure 4, it is not the
separation of concerns. So, on the face of it, all this
same. This becomes clearer in Figure 9.
sounds very similar to the goals of our ARM devel-
opment process. Figure 9 is pieced together from Figure 4 (ARM)
and Figure 7 (Model-Driven Engineering). As one
In Figure 7, the main idea of model-driven architec-
can see, both the ARM and the Model-Driven-
ture is shown. A platform-independent model, viz.
Engineering approach are linked to each other
an architecture, is to be transformed into a platform-
through platform-independent models, but they
specific model, viz. an implementation. An example
reside on different levels of abstraction. While the
for the former is a GUI user interface described in
general idea of a model transformation, as promot-
UML, and the latter
ed by MDE, resonates with our ARM approach (see
Figure 4), the methodology developed for the deri-
vation of transformations between platform-
independent and platform-specific models can, up-
on a thorough analysis, not be transferred and
Figure 7: Generalised architecture approach adapted for the derivation of Best-Practice trans-
according to the Model-Driven-Architecture
methodology, a.k.a. Model-Driven Engineering. formations.

is an implementation of said interface in a cell-

Process and Architecture Methodology


Pattern-Based Design is a technique that reuses ARM.
repeatable solutions to solve commonly occurring
Methodology Aspect adopted in our work
problems. In this design method one records how
Aspect- Delineation of functionalities by aspects. This
object-oriented designers identify recurring design Oriented Pro- is embodied in the concept of Functionality
problems. The corresponding solutions are then gramming Groups

documented, and a reuse of the solutions is strived Model-Driven General concept of transformation from a
Engineering generic to a more specific model. We use this
for. Consequently, the design process becomes concept for describing and developing our
increasingly flexible, elegant, and, most important, Best Practice.

reusable. The solutions are divided into Sub- Pattern-Based We will test the efficacy of this method upon
Design deriving a concrete architecture as a best-
solutions, where “A design pattern identifies the practice test case.
participating classes and instances, their roles and
Views and We adopt the concept of views and perspec-
collaborations, and the distribution of responsibili- Perspectives tives for the derivation of the IoT Reference
Architecture, viz. we arrange all aspects of
ties. Each design pattern focuses on a particular our reference architecture according to views
object-oriented design problem or issue”. From this and perspectives). The same is done for the
unified requirements.
short discussion it becomes clear that (a) Pattern-
Table 1: Usage of standardised architecture
Based Design was developed for implementation methodologies for the development of the IoT ARM.
processes, viz. the transformation to the right in
Requirements process 
Figure 9, and that (b) the only way this method can
The IoT Reference Model by itself does not specify
be applied for the derivation of the best-practice
the technical particularities of an IoT system. For
transformation in the same Figure would be by try-
example, how are things identified and addressed in
ing to translate the ARM into a particular architec-
an IoT context? Or: how are these things associat-
ture and to see whether the “book-keeping” ap-
ed with services? Such particularities are addressed
proach prescribed by Pattern-Based Design yields
in the IoT Reference Architecture. In order to build
valuable insight. At the current stage we do not
such a reference architecture, we not only need the
know whether this is possible and aim at finding out
IoT Reference Model and the methodology to do so,
during on-going best-practice development, which,
but also technical requirements that can be used for
among others, encompasses the derivation of a
inferring particularities of the architecture. This is
concrete architecture.
reflected in Figure 5.
In Table 1 we summarise how we use ideas bor-
In this Section we explain how the requirements for
rowed from standardised architecture methodolo-
the IoT ARM have been inferred. The collection of
gies for our work on the higher abstract level of an

Figure 9: Relation of the Best-Practice-driven derivation of concrete architectures


form an architectural reference model and the derivation of implementations from
said concrete architecture.

Process and Architecture Methodology


requirements was done in a three-pronged process: cern: “Today, due to sub-optimal processes, a lot of
time and money is wasted. This situation could be
1. The rich experience and knowledge of the
improved a lot by tracking all the items/things,
project partners guided the derivation of a
providing context data on them at any time and
minimum-requirement list, which also had a
location, allowing for automated evaluation of the
major influence in drafting the Reference
collected data and reacting immediately on a dan-
Modelmodel. The state of the art concern-
gerous situation to protect against the breakdown-
ing thing-centric communication and Inter-
break-down of items.” This addresses the functional
net technologies was considered, and a list
view, but it does not clearly address what function-
of internal requirements was deduced.
alities are needed in order to meet this aspiration. In
2. A group of external IoT stakeholders was our requirement-engineering process, we broke this
established and queried for their use cases concern down into two distinct functional require-
and their expectations toward IoT. They ments.
were also asked for their objectives, con-
 “The system shall enable centralized or de-
cerns, and business goals. As far as feasi-
centralized automated activities (control
ble, these overarching aspirations were
loops).”
broken down into requirements.
 “The system shall enable the planning of
Usually, such stakeholder aspirations are not made
automated tasks.”
as system requirements, rather as use-case specific
goals. Therefore, each stakeholder aspiration was The above example was provided in order to briefly
thoroughly analysed, and suitable translations into illustrate our requirement process. The functional
requirements were sought. Stakeholder aspirations view is a recurring item in the list of unified require-
can be rather general (strategic objectives, con- ments. This view is represented as a block-diagram
cerns, or business goals) or they can be very spe- in the IoT Reference Architecture, which in itself
cific, i.e., a stakeholder spells out what kind of func- constitutes a central result of the IoT-A project and
tionality or performance she/he needs. An example an indispensable input for the development of a
for the former is the functionality of the IoT systems. compliant IoT system.
For instance, European Telecommunications
Standards Institute ETSI raised the following con-

Business Scenarios validating the ARM
Business scenarios play an important role in the the same time, business scenarios help under-
external validation of the Architectural Reference standing the IoT Reference Model as such, as the
Model (ARM). Business scenarios help defining domain components described in the reference
application-specific requirements, i.e., they are one model are reflected in the respective business sce-
source of input regarding what potential systems narios, i.e. the reference model provides a formal-
and applications need to implement and deliver, if ised and abstracted model of the entities and their
they are to realise certain business scenarios. At

Business Scenarios validating the ARM


relationships that are brought to life within the dif- o Many stakeholders see IoT as a means of
ferent business scenarios. improving their current business. IoT will
thus serve various business goals and stra-
Rationale and Introduction  tegic objectives, such as future-proof, low-
The primary aim of business scenarios is to provide
ered costs, etc.
an external validation of the ARM in economic
terms, i.e., business scenarios should demonstrate o Other stakeholders see IoT as a disruptive
that concrete systems built utilising concrete ARM technology, which will aid them in creating
compliant architectures are economically viable and new applications and thus new business
beneficial, so that it makes sense for business opportunities (selling access to sensor da-
stakeholders to develop business scenarios based ta, etc.).
on IoT-A models and best practices. Ideally, busi-
o In order to achieve a maximum of flexibility
ness scenarios should cover a diverse set of rele-
of IoT technology and its use, short prod-
vant application fields in order to demonstrate the
uct-development cycles, and a maximum
broad applicability of IoT-A, especially since one of
leverage of existing and new solutions to
the primary goals of IoT-A is to develop an IoT Ref-
common problems is needed. For that rea-
erence Architecture that transforms the isolated
son, many stakeholders advocate open IoT
island solutions of the “intranets of things” as we
platforms and frameworks. The underlying
know them today into a domain-spanning interop-
business goal for this advocacy is to lower
erable infrastructure of IoT platforms that is viable
costs in product development. Strategic ob-
from an economic point of view and facilitates novel
jectives are to enhance product interopera-
business opportunities.
bility and to shorten the development cy-
Due to limited space, we will here only briefly dis- cles. The latter is important for responding
cuss the main application fields for which viable to customers’ emerging needs in an agile
business scenarios compliant to IoT-A can be de- manner.
veloped, and then focus only on one central appli-
o Since active supervision of IoT interactions
cation field in the focus of the project, namely the
is even more elusive than monitoring to-
retail domain.
day’s Internet traffic, security and privacy
The narrowed focus of the use cases comes from have, as expected, been identified as a
the fact the stakeholder group of the IoT-A project core topic. Privacy is strongly related to the
focuses mostly on selected application fields. With- overall acceptance of IoT. If individuals and
in these fields, stakeholder aspirations can of other users cannot experience a sufficient
course be diverse, because of differences in their level of privacy when utilising IoT technolo-
background and differences in their business views. gy, this will critically challenge the ac-
Nevertheless, there are some common themes in ceptance of this novel technology. Security
stakeholder aspirations that make us confident that equates of course not only to privacy, but
there is some potential for generalizing business also to the protection of the IoT against in-
scenarios: terferences, such as service attacks, tro-
jans, viruses, etc.

Business Scenarios validating the ARM


Fields of Application  cooperate in the user’s home, such as Internet
In order to maximise the impact of our architectural companies, device manufacturers, telecommunica-
reference model, we have to identify those scenari- tions operators, media-service providers, security
os where IoT technologies have a special rele- companies, electric-utility companies, etc.
vance, taking into account that these scenarios
Smart city 
frequently share the same applications, sensors,
stakeholders and, of course, users. We will base While the term smart city is still a fuzzy concept,

this identification on scenarios that have been kind- there is a general agreement that it is an urban

ly provided by the IoT-i1 project. area which creates sustainable development and
high quality of life. Important areas of a smart city
Transportation/ Logistics  are , encompassing economy, people, governance,
In transport logistics, IoT improves not only material mobility, environment and living. Outperforming in
flow systems, but also global positioning and auto- these key areas can be done through strong human
identification of freights. Additionally, it increases or social capital and/or ICT infrastructure. For the
energy efficiency and decreases thus energy con- latter, a first business analysis concludes that sev-
sumption. In conclusion, IoT is expected to bring eral sectors/industries will benefit from more digital-
profound changes to the global supply chain via ised and intelligent cities (examples for a city of 1
intelligent cargo movement. This will be achieved million people2:
by means of continuous process synchronisation of
 Smart metering, 600.000 meters, US $ 120
supply-chain information, and seamless real-time
million opportunity
tracking and tracing of objects. It will provide the
supply chain a transparent, visible and controllable  Infrastructure for charging electric vehicles,
nature, enabling intelligent communication between 45.000 electric vehicles, US $ 225 million
people and cargo. opportunity

Smart home   Remote patient monitoring (diabetes),


Future smart homes will be conscious about what 70.000 people, US $ 14 million opportunity
happens inside a building, mainly impacting three
 Smart retail, 4.000 stores, US $ 200 million
aspects: resource usage (water conservation and
opportunity
energy consumption), security, and comfort. The
goal with all this is to achieve better levels of com-  Smart-bank branches, 3.200 PTMs, US $
fort while cutting overall expenditure. Moreover, 160 million opportunity
smart homes also address security issues by
means of complex security systems to detect theft, Smart factory 

fire or unauthorized entries. The stakeholders in- Companies will be able to track all their products by
volved in this scenario constitute a very heteroge- means of RFID tags in a global supply chain; as a
neous group. There are different actors that will consequence, companies will reduce their opera-

2
Cf. R. Nicholson, “Smart Cities: Proving Ground for the Intelli-
1
See http://www.iot-i.eu/ gent Economy”, 2010

Business Scenarios validating the ARM


tional expenditure and improve their productivity place. Tracing peoples’ health history is another
due to a tighter integration with enterprise resource aspect that makes IoT-assisted eHealth very versa-
planning and other systems. Generally, IoT will tile. Business applications could offer the possibility
provide automatic procedures that imply a drastic of medical service not only to patients but also to
reduction in the number of employees needed. specialists, who need information to proceed in
Workers will be replaced by bar-code scanners, their medical evaluation. In this domain, IoT makes
readers, sensors and actuators, and in the end by human interaction much more efficient because it
complex robots that are as efficient as a human. not only permits localization, but also tracking and
Without any doubt, these technologies will bring monitoring of patients. Providing information about
opportunities for white-collar workers and a big the state of a patient makes the whole process
number of technicians will be necessary to program more efficient, and also makes people much more
and repair these machines. This is synonymous to satisfied.
a transfer to maintenance jobs, but it also consti-
The most important stakeholders in this scenario
tutes a new challenge for providing all blue-collar
will be public and private hospitals and institutes
workers with an opportunity to move toward these
such as, e.g., the Institute of Applied eHealth at
types of jobs and to avoid unemployment.
Edinburgh Napier University, which partook in the
Retail  first stakeholder session of IoT-A. It is worth men-
IoT realises both customer needs and business tioning that telecommunications operators are quite
needs. Price comparison of a product; or looking for active in e-health (for instance, O2 UK).
other products of the same quality at lower prices,
Environment 
or with shop promotions gives not only information
Applications in the environmental domain have
to customers but also to shops and business. Hav-
many overlaps with other scenarios, such as smart
ing this information in real time helps enterprises to
home and smart city. The key issue in these sce-
improve their business and to satisfy customer
narios is to detect means that help to save energy.
needs.
One prominent example is Smart Grid. Concerning
Obviously, big retail chains will take advantage of this application area one needs to highlight initia-
their dominant position in order to enforce the future tives that imply a more distributed energy produc-
IoT retail market, as it happened with RFID adop- tion, since many houses have a solar panel today.
tion, which was enforced by WalMart in 2004. Par-
As a vital part, smart metering is considered as a
ticularly, companies with controlling positions, such
pre-condition for enabling intelligent monitoring,
as WalMart, Carrefour, Metro AG, etc. are able to
control, and communication in grid applications.
push the adoption of IoT technology due to their
The use of IoT platforms in Smart Metering will
sizeable market power.
provide the following benefits:
e‐Health 
 An efficient network of smart meters allows
Controlling and preventing is one of the main goals
for faster outage detection and restoration
of future health care. Already today, people can
of service. Such capabilities redound to the
have the possibility of being tracked and monitored
benefit of customers
by specialists even if both are not at the same

Business Scenarios validating the ARM


 Provides customers with greater control Business Case Methodology 
over their energy or water consumption, As demonstrated above, there is a huge potential
providing them more choices for managing for realising IoT applications in different application
their bills. fields that are based on architectural concepts of
IoT-A and potentially bring novel business opportu-
 IoT deployment of smart meters is ex-
nities, for instance when sensor technology contrib-
pected to reduce the need to build power
utes to changing distribution models for perishable
plants. Building power plants that are nec-
goods, so that e.g. fruits or vegetables can still be
essary only for occasional peak demand is
sold to the consumer before their quality deterio-
very expensive. A more economical ap-
rates and the goods are wasted. However, in order
proach is to shape the demand by either to
to make such scenarios possible large investments
incentivize customers to reduce their de-
are needed in, e.g., hardware, software, installation,
mand through time-based rates or other
configuration, maintenance, business process
programs, or by service-level agreements
reengineering and training of personnel. To justify
that allow temporarily turning off devices
such investments, a ‘business case’ (BC) is usually
which are not needed (e.g., the freezer for
developed, describing the benefits, costs and risks
20 minutes).
of each investment alternative.

In order to describe a well-defined business model


BCs commonly appear as spread-sheets, often
it is necessary to define what needs to be done in
accompanied by presentations or explanatory doc-
the business, which are the metrics for success,
uments. They may be presented by the project
which are the problems that must be solved and the
leader (BC ‘owner’ or ‘champion’) to senior man-
plans that solve these problems. Knowing which
agement, which is responsible for prioritizing BCs
part of the problem is possible to solve and how
and making investment decisions. This way, the BC
much time is needed and which part cannot be
can be used to decide about investment before
solved is an important step that we must take into
project execution (‘ex-ante’), to evaluate progress
account when we develop concrete business cases
during project execution and to determine to what
for some of the application fields discussed above.
extent the proposed value of the investment has

As we can only go into the details of one business been realized after project execution (‘ex-post’).

case in the context of this document, we will pick a Naturally, the development of BCs is a complex

use case from the application field of retail, as this task. First, collecting, transforming and aggregating

is a central application field for the project, and the required information demands interdisciplinary

apply an appropriate business case methodology to teamwork and expertise in a wide range of fields

it. This methodology is outlined in the next section. such as business strategy, business operations

The use of a methodology instead of merely calcu- (‘work practice’), information technology, account-

lating “some kind of business case” enables us to ing and project management. Second, BCs are

perform comparisons between different application based on assumptions concerning the future devel-

fields, for instance when we consider health under opment of certain variables. Predicting those varia-

an economic perspective within the context of the bles requires accurate data and reliable analysis

forthcoming deliverables. methods. Third, BCs are subject to a constantly

Business Scenarios validating the ARM


changing business environment, requiring an agile information has the potential to reduce the consul-
BC development process to adapt to these chang- tation time of the sales personnel in the store.
es.
In order to make the business case somewhat more
Within the context of IoT-A, BCs should be based complex, we also integrate the sensor based quality
on a generic BC process to allow for their develop- control use case and assume that both scenes are
ment, use and improvement across different appli- interconnected, because they are based on a
cation fields. We therefore base the BC process on common architecture, namely a concrete architec-
a framework that is being developed in the IoT pro- ture based on the IoT-A Reference Architecture.
3
ject SemProM that proposes a BC framework
The sensor based quality control scene shows how
which is based on a generic BC process, consisting
sensors monitor perishable goods in a store. De-
of six steps: Scope, Processes, Criteria, Methods,
pending on the luminance, humidity, and tempera-
Results, Conclusion. During this process, domain-
ture of the environment, the estimated future quality
specific components consisting of criteria and
of the perishable products is determined and prices
methods may be reused.
are reduced even before a perceivable degradation
The BC framework provides a set of spread-sheets of quality occurs. By applying this sensor based
in Microsoft Excel that accompany the process quality control and combining it with dynamic pric-
proposed. In the following section, we apply this ing, it is ensured that the goods are sold before
framework to two of the primary retail use cases of quality degradation is likely to occur. From a busi-
IoT-A, namely the NFC Based Shopping Assistant ness and industry perspective, the scene demon-
in combination with the sensor- based quality con- strates two important retail-related concepts: Dy-
trol. namic pricing and quality control of perishable
goods. Dynamic pricing as a real-time tool for price
Retail Business Case  optimization strategies has always been crucial. In
The use case shows how IoT technologies like
contrast to the state of the art, dynamic pricing in
sensor technologies built into consumer electronic
the featured use case is not performed on static
devices and NFC tags coupled with the Internet of
information such as best-before dates in the
Things Architecture can provide useful meta-
backend ERP system, but it is based on real time
information to the customer to enhance the overall
IoT data gathered from a sensor infrastructure. As
shopping experience and at the same time signifi-
about 20% of perishable goods never reach the
cantly reduce the costs for consulting that sales
consumer, but are disposed of before, the utilization
personnel in the retail stores need today, as there
of IoT sensors is also an interesting concept to
are no such systems in widespread use. The use
implement quality control of perishables and thus
case demonstrates a direct human-to-machine
reduce waste and increase profits at the same time.
interaction.
As we have stated before, we assume that both the
From a business perspective, the use case is pri-
self-contained NFC-based product information and
marily interesting because the NFC-based product
the sensor based quality control are based on the
same technical system realised in accordance with
3
http://www.semprom.de/
the IoT-A ARM. Therefore, we calculate their antici-

Business Scenarios validating the ARM


pated effects in a combined business case. The The core result of the business case calculation for
actual Excel sheets are available on the IoT-A web- the retail domain is that, apart from the reduced
site at www.iot-a.eu, but in the following tables we waste of perishables due to the sensor based quali-
already provide some of the respective criteria, on ty control, the consulting time of sales personnel
which the calculations are based, as well as instan- being reduced significantly, in our case about 30%,
tiations of these criteria calculated for cases, when so that IoT-based scenarios indeed appear to have
the IoT-A -based use cases are realised and when a significant business impact. For the detailed re-
they are not realised (= the baseline). sults, please consult the respective spread-sheet.

In our calculations we base our BC on an example The business case as we have calculated it for a
case for German Retailers trading fast moving con- retailer from the FMCG field does not yet take into
sumer goods (FMCG) in a higher market segment. account the savings and benefits of software sys-
The following two tables outline the respective pa- tems that are compliant with the IoT-A Reference
rameters used. Architecture and that follow the best practices and
design choices laid out by the IoT-A project. While
we envision the best practices to be a strong and
central contribution of the project, it is currently hard
to calculate its economic impact.

Table 2: Sample Instantiations for the Retail

Table 3: Criteria for the Retail Business Case

Business Scenarios validating the ARM


Conclusions & Outlook 
Apart from the best practices, we also believe that The latest project deliverable D1.3 already includes
substantial economic benefits can emerge from the lavish sections on design choices and best practic-
modular and component-based approach to build- es that will be further augmented and refined in
ing IoT systems that are compliant with the IoT-A order to develop an easily accessible guide for
Reference Architecture. These additional business implementation that will certainly have an impact
effects will also be taken into account for future beyond the IoT-A partners and the projects in the
business cases. IERC cluster. Our leitmotif was and remains to pro-
vide the industry standard for implementing future
While we can already state that from an economic
IoT systems based on a modular, common ap-
perspective the IoT-A approach simply makes
proach and an accessible, yet sophisticated, refer-
sense, it is also important to note that solid busi-
ence architecture.
ness scenarios are only a precondition to the appli-
cation of the ARM. In order to implement Internet of Please follow our activities towards the concretiza-
Things use cases based on the IoT-A Reference tion of the ARM and the best practices on working
Architecture, the project aims at providing much with the ARM by visiting our website at www.iot-
more than just the Reference Architecture itself and a.eu and getting the latest version of the ARM. In
an economic validation: The business cases are order to give feedback and help shaping future
just one building block towards a fully featured versions of the ARM and the best practices for im-
“Cook book” with information on various aspects plementation, please make sure to get in touch with
concerning the implementation of IoT systems. It us and our stakeholder group about which you can
will provide best practices for the various modules also find information on our website.
that the ARM comprises and will discuss design
choices that academics and practitioners alike will
be faced with when implementing concrete systems
based on IoT-A.

Conclusions & Outlook


Imprint 
Editors:

Sebastian Lange (VDI/VDE-IT), Andreas Nettsträter (Fraunhofer IML), Stephan Haller (SAP), Francois Carrez
(University of Surrey), Alessandro Bassi (Hitachi)

Authors:

Martin Bauer (NEC), Nicola Bui (Consorzio Ferrara Ricerche), Francois Carrez (University of Surrey),
Pierpaolo Giacomin (Hitachi), Stephan Haller (SAP), Edward Ho (University of St.Gallen), Christine Jardak
(Siemens), Jourik De Loof (Alcatel-Lucent), Carsten Magerkurth (SAP), Andreas Nettsträter (Fraunhofer IML),
Alexandru Serbanati (Sapienza University of Rome), Matthias Thoma (SAP), Joachim W. Walewski (Sie-
mens), Stefan Meissner (University of Surrey)

Imprint

You might also like